SharePoint Online via Restricted Application Access
An alternative way to connect to SharePoint Online using site-scoped application permissions instead of granting organization-wide SharePoint access.
Overview
Movebot supports connecting to SharePoint Online using a restricted application configuration that limits access to a defined subset of SharePoint sites within the tenant.
This method introduces additional configuration complexity and is not recommended unless site-level access restriction is required.
We recommend only administrators familiar with Microsoft Entra, Microsoft Graph API, and application permissions perform this setup. Contact support before proceeding if unsure.
When should this be used instead of full access?
If you require:
Restricting access to a specific SharePoint site
Compliance controls preventing tenant-wide SharePoint access
If you are not subject to the above requirements, follow the standard SharePoint Online guide.
Requirements
To configure this connection method, you will need:
A Movebot account
A Microsoft 365 administrator account
Access to Microsoft Entra ID
Access to Microsoft Graph Explorer
How to Configure Restricted SharePoint Access
Create the Application Registration in Entra
Login to Microsoft Entra as an administrator and navigate to App registrations.
Click New registration.
Specify a name for the new application. Leave the remaining fields as default. Click Register.
Make note of the following values:
Application (Client) ID – required for Movebot configuration
Directory (Tenant) ID – required for Movebot configuration
Configure API Permissions Graph API
API Permissions → Add a Permission
Select: Microsoft Graph → Application Permissions
Enable permission:
Click Grant admin consent.
SharePoint API
API Permissions → Add a Permission
Select: SharePoint API→ Application Permissions
Enable permission:
Click Grant admin consent.
Create a Client Secret
Navigate to: Certificates & secrets → Client secrets → New client secret
Create the secret and copy the Client Secret Value.
This will be required in Movebot.
Configure the Connection in Movebot
The following information must be entered into the Movebot SharePoint connector:
SharePoint Domain
Tenant ID
Application Client ID
Application Client Secret
Upload the certificate from Movebot
Finally, you will need to generate and download the client certificate from Movebot and upload it to Azure for authentication.
Under Step 3: click the button Generate and Download Certificate. You should get a PEM file download from Movebot.
In Azure - Click Certificates and Secrets -- > Certificates -- > Upload Certificate
Upload the file created in step 1
The thumbprint in Azure should match the one shown in Movebot
Grant Site-Level Access Using Microsoft Graph
The
Sites.Selectedpermission alone does not grant access. Site-level permissions must be assigned explicitly.Retrieve the Site ID. Open the following URL in your browser and replace the placeholders:
Example:
Copy the returned Site ID (GUID) value.
Sign in to Graph Explorer
Navigate to: https://aka.ms/ge
Sign in with a Microsoft account.
Grant your user the following delegated permission:
(This is required only to assign site permissions.)
Assign Application Access to the Site
Run the following request in Graph Explorer:
POSThttps://graph.microsoft.com/v1.0/sites/{site_id}/permissionsReplace
{site_id}with the Site ID retrieved earlier.Request Body:
A successful response returns:
Assign Application Access to Root Site (Required)
Run the following request in Graph Explorer:
POSThttps://graph.microsoft.com/v1.0/sites/root/permissionsUse the same request body format as above.
This ensures the application can resolve the SharePoint structure correctly.
Important Notes
Connection Test Behaviour
When using restricted site scoping:
The Movebot connection test may not validate all sites automatically.
Only the specifically granted SharePoint site will be accessible.
This is expected behaviour.
Permission Propagation Delay
Permission updates may not take effect immediately.
In some environments, it can take up to an hour before site access reflects the new configuration. If testing fails immediately after setup, wait and retry before troubleshooting further.
Site Mapping Requirement
When using restricted access:
Site transfers must be mapped manually using CSV Transfer Mapping.
Only explicitly granted SharePoint sites are accessible.
Access to other sites in the tenant will result in failures.
Supported Features
Certain features are unsupported using restricted access.
SharePoint Document Libraries
Supported (no automatic creation)
Permissions
Not Supported
Versions
Fully Supported
Modtime Retention
Fully Supported
Last updated